OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in the Synology Chat extension that allows attackers to collapse multi-account configurations onto shared webhook paths. Attackers can exploit inherited or duplicate webhook paths to bypass per-account DM access control policies and replace route ownership across accounts.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in the Synology Chat extension that allows attackers to collapse multi-account configurations onto shared webhook paths. Attackers can exploit inherited or duplicate webhook paths to bypass per-account DM access control policies and replace route ownership across accounts. | |
| Title | OpenClaw < 2026.3.22 - Webhook Path Route Replacement Vulnerability in Synology Chat | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-706 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-09T21:27:05.119Z
Reserved: 2026-04-04T12:29:42.739Z
Link: CVE-2026-35635
No data.
Status : Received
Published: 2026-04-09T22:16:32.567
Modified: 2026-04-09T22:16:32.567
Link: CVE-2026-35635
No data.
OpenCVE Enrichment
No data.
Weaknesses